Which of the following is done during passive information gathering?

A) Run a port scan against the target system to find open ports
B) Search the web for any useful information about the company
C) Perform a ping scan against the target system
D) Attempt to connect to shared folders on the target system


B) Search the web for any useful information about the company

Computer Science & Information Technology

You might also like to view...

An organization with many employees with each employee having a unique phone extension is said to be a ________ relationship.

A) 1:1 B) 1:Many C) Many:1 D) Many:None

Computer Science & Information Technology

One of the benefits of using macros in Access is to:

A) efficiently and accurately process database ad hoc queries from several remote locations. B) set the correct table relationships that will help to efficiently organize the data in a database. C) automate non-routine tasks within an Access database. D) decrease processing time within a database while simultaneously reducing potential errors in the processing of data.

Computer Science & Information Technology

The DVD and BD region code for the United States and Canada is the number _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

What command should you use to change the name of an existing volume?

A. setvol B. attrib /volname C. volname D. format /v

Computer Science & Information Technology